Academic literature on the topic 'Forensics and counter-forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensics and counter-forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Forensics and counter-forensics"
Premanand Narasimhan and Dr. N. Kala. "Emerging Trends in Digital Forensics : Investigating Cybercrime." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 3645–52. https://doi.org/10.32628/cseit251451.
Full textDOVHAN, O., and T. TKACHUK. "Combating counter-forensics as a component of digital security of critical infrastructure of Ukraine." INFORMATION AND LAW, no. 2(53) (June 24, 2025): 115–25. https://doi.org/10.37750/2616-6798.2025.2(53).334135.
Full textKeenan, Thomas. "Counter-forensics and Photography." Grey Room 55 (April 2014): 58–77. http://dx.doi.org/10.1162/grey_a_00141.
Full textKang, Xiangui, Jingxian Liu, Hongmei Liu, and Z. Jane Wang. "Forensics and counter anti-forensics of video inter-frame forgery." Multimedia Tools and Applications 75, no. 21 (2015): 13833–53. http://dx.doi.org/10.1007/s11042-015-2762-7.
Full textYang, Pengpeng, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. "A Survey of Deep Learning-Based Source Image Forensics." Journal of Imaging 6, no. 3 (2020): 9. http://dx.doi.org/10.3390/jimaging6030009.
Full textIrons, Alastair, and Jacques Ophoff. "Aspects of Digital Forensics in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 11 (2016): 273–83. http://dx.doi.org/10.28945/3576.
Full textAmit, Kapoor, and Vinod Mahor Prof. "Broadcasting Forensics Using Machine Learning Approaches." International Journal of Trend in Scientific Research and Development 7, no. 3 (2023): 1034–45. https://doi.org/10.5281/zenodo.8068297.
Full textAhmed, Abdulghani Ali, Khalid Farhan, Waheb A. Jabbar, Abdulaleem Al-Othmani, and Abdullahi Gara Abdulrahman. "IoT Forensics: Current Perspectives and Future Directions." Sensors 24, no. 16 (2024): 5210. http://dx.doi.org/10.3390/s24165210.
Full textFuller, Matthew, and Nikita Mazurov. "A Counter-Forensic Audit Trail: Disassembling the Case of The Hateful Eight." Theory, Culture & Society 36, no. 6 (2019): 171–96. http://dx.doi.org/10.1177/0263276419840418.
Full textImeri Saiti, Deshira, Mentor Hamiti, and Jehona Asani. "Handling Data Security in Education." International Journal of Education & Well-Being 2, no. 2 (2024): 108–22. https://doi.org/10.62416/ijwb-41.
Full textDissertations / Theses on the topic "Forensics and counter-forensics"
Nowroozi, Ehsan. "Machine Learning Techniques for Image Forensics in Adversarial Setting." Doctoral thesis, Università di Siena, 2020. http://hdl.handle.net/11365/1096177.
Full textDafale, Ninad N. "Source Anonymization Through Counter Forensics." Thesis, 2017. http://ethesis.nitrkl.ac.in/9074/1/2017_MT_NNDafale.pdf.
Full textBooks on the topic "Forensics and counter-forensics"
Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.
Full textBook chapters on the topic "Forensics and counter-forensics"
Rodger, Johnny. "Counter-forensics." In Key Essays. Routledge, 2021. http://dx.doi.org/10.4324/9781003186922-11.
Full textBöhme, Rainer, and Matthias Kirchner. "Counter-Forensics: Attacking Image Forensics." In Digital Image Forensics. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-0757-7_12.
Full textNeha Singh and Sandeep Joshi. "Digital Image Forensics and Counter Anti-forensics." In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2638-3_90.
Full textKeenan, Thomas. "Counter-forensics and photography 1." In The Routledge Companion to Photography Theory. Routledge, 2019. http://dx.doi.org/10.4324/9781315727998-19.
Full textLai, ShiYue, and Rainer Böhme. "Countering Counter-Forensics: The Case of JPEG Compression." In Information Hiding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24178-9_20.
Full textRodrigues, Marcos A., and Alan Robinson. "Fast 3D Recognition for Forensics and Counter-Terrorism Applications." In Advanced Information and Knowledge Processing. Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2140-4_7.
Full textLi, Wenjie, Benedetta Tondi, Rongrong Ni, and Mauro Barni. "Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics." In Pattern Recognition. ICPR International Workshops and Challenges. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68780-9_34.
Full textIvascu, Lacramioara Nicoleta, and Hamid Jahankhani. "An Investigation into Counter Drones Digital Forensics Aided by Remote Identification." In Space Governance. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62228-1_7.
Full textPic, Marc Michel, Gaël Mahfoudi, Anis Trabelsi, and Jean-Luc Dugelay. "Face Manipulation Detection in Remote Operational Systems." In Handbook of Digital Face Manipulation and Detection. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_19.
Full textDas, Debjit, Banalata Bhunia, Ruchira Naskar, and Rajat Subhra Chakraborty. "Linear and Non-Linear Filter-based Counter-Forensics Against Image Splicing Detection." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31407-0_20.
Full textConference papers on the topic "Forensics and counter-forensics"
Dang-Nguyen, D. T., I. D. Gebru, V. Conotter, G. Boato, and F. G. B. De Natale. "Counter-forensics of median filtering." In 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP). IEEE, 2013. http://dx.doi.org/10.1109/mmsp.2013.6659298.
Full textSingamsetty, Ramu, Koneru Sai Chandra Has, Sravani Kukkapalli, Veera Narayana Mannipudi, K. V. D. Kiran, and A. V. Praveen Krishna. "Information Security Using Counter-Anti-Forensics." In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2023. http://dx.doi.org/10.1109/icaccs57279.2023.10112678.
Full textTailanián, Matías, Marina Gardella, Alvaro Pardo, and Pablo Musé. "Diffusion models meet image counter-forensics." In 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2024. http://dx.doi.org/10.1109/wacv57701.2024.00388.
Full textIuliani, M., S. Rossetto, T. Bianchi, Alessia De Rosa, A. Piva, and M. Barni. "Image counter-forensics based on feature injection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2014. http://dx.doi.org/10.1117/12.2042234.
Full textGoljan, Miroslav, Jessica Fridrich, and Mo Chen. "Sensor noise camera identification: countering counter-forensics." In IS&T/SPIE Electronic Imaging, edited by Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III. SPIE, 2010. http://dx.doi.org/10.1117/12.839055.
Full textFahmy, Gamal, Abdullah Alqallaf, and Rolf Wurtz. "Phase based detection of JPEG counter forensics." In 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2015. http://dx.doi.org/10.1109/icecs.2015.7440243.
Full textValenzise, G., M. Tagliasacchi, and S. Tubaro. "Detectability-quality trade-off in JPEG counter-forensics." In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 2014. http://dx.doi.org/10.1109/icip.2014.7026080.
Full textMarra, Francesco, Giovanni Poggi, Fabio Roli, Carlo Sansone, and Luisa Verdoliva. "Counter-forensics in machine learning based forgery detection." In IS&T/SPIE Electronic Imaging, edited by Adnan M. Alattar, Nasir D. Memon, and Chad D. Heitzenrater. SPIE, 2015. http://dx.doi.org/10.1117/12.2182173.
Full textDeLooze, Lori L. "Counter hack: Creating a context for a cyber forensics course." In 2008 IEEE Frontiers in Education Conference (FIE). IEEE, 2008. http://dx.doi.org/10.1109/fie.2008.4720283.
Full textDrescher, Adam, Brandon De Luna, Marjolein Pasman, Derek Haas, and Sheldon Landsberger. "Revamping of a Graduate Radiochemistry Course for Nuclear Forensics Applications." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81593.
Full textReports on the topic "Forensics and counter-forensics"
Naif Arab University for Security Sciences, Centre of Excellence in Cybercrimes and Digital Forensics. Cyber-enabled Terrorism in the African and Arab Regions: Survey Report from NAUSS-UNCCT Workshop. Naif University Press, 2024. http://dx.doi.org/10.26735/iwjx5145.
Full text